Search for packages
| purl | pkg:gem/puppet@2.8 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3kma-3ffw-8qd9
Aliases: CVE-2013-3567 GHSA-f7p5-w2cr-7cp7 |
Improper Input Validation Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. |
Affected by 16 other vulnerabilities. |
|
VCID-5g6u-uvej-xbad
Aliases: CVE-2013-4761 GHSA-cj43-9h3w-v976 |
Moderate severity vulnerability that affects puppet Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master. |
Affected by 16 other vulnerabilities. |
|
VCID-7ypq-wmb7-quhc
Aliases: CVE-2014-3248 GHSA-92v7-pq4h-58j5 |
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. |
Affected by 16 other vulnerabilities. |
|
VCID-pdpa-qfpq-zkcq
Aliases: CVE-2013-1655 GHSA-574q-fxfj-wv6h |
Improper Input Validation Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes." |
Affected by 16 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T15:18:22.807990+00:00 | Ruby Importer | Affected by | VCID-5g6u-uvej-xbad | https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml | 38.0.0 |
| 2026-04-01T15:18:22.673702+00:00 | Ruby Importer | Affected by | VCID-7ypq-wmb7-quhc | https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2014-3248.yml | 38.0.0 |
| 2026-04-01T15:18:22.364568+00:00 | Ruby Importer | Affected by | VCID-pdpa-qfpq-zkcq | https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml | 38.0.0 |
| 2026-04-01T15:18:22.341514+00:00 | Ruby Importer | Affected by | VCID-3kma-3ffw-8qd9 | https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml | 38.0.0 |